Security....

Scot L. Harris webid at cfl.rr.com
Wed Oct 27 19:57:37 UTC 2004


On Wed, 2004-10-27 at 15:25, Chris Hewitt wrote:

> 
> Just wondering if I am missing something here. It may take a long time
> to go through _all_ combinations, but all the cracker wants is the
> _correct_ password. This might be on the first try, but not likely the
> last.
> 
> Regards
> 
> Chris

Correct.  And as someone already pointed out, most human generated
passwords do not use the full set of characters available in a random
fashion.  On top of that most passwords are dictionary based.  So using
the right dictionary tool can greatly reduce the possible combinations
that you have to try.  Of course if someone was seriously trying to
access a particular system social engineering would most likely work
quicker and easier.  Plus a little research on the target can help
narrow the possibilities if you do have to perform a brute force attack.


-- 
Scot L. Harris
webid at cfl.rr.com

There are no answers, only cross-references.
		-- Weiner 




More information about the fedora-list mailing list